共 33 条
[1]
Eschenauer L., Gligor V.D., A key management scheme for distributed sensor networks, Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41-47, (2002)
[2]
Zhu S., Setia S., Jajodia S., LEAP: Efficient security mechanisms for large-scale distributed sensor networks, ACM CCS 2003, pp. 62-72, (2003)
[3]
Gupta P., Kumar P., The capacity of wireless networks, IEEE Transactions on Information Theory IT 2000, 2, pp. 388-404, (2000)
[4]
Du X., Xiao Y., Guizani M., Chen H.H., An Effective Key Management Scheme for Heterogeneous Sensor Networks, AdHoc Networks, Elsevier, 5, 1, pp. 24-34, (2007)
[5]
Adler R., Flanigan M., Huang J., Kling R., Kushalnagar N., Nachman L., Wan C.-Y., Yarvis M., Intel mote 2: An advanced platform for demanding sensor network applications, SenSys '05, (2005)
[6]
Bohge M., Trappe W., An authentication framework for hierarchical ad hoc sensor networks, Proc. of 2003 ACM workshop on Wireless Security (WiSE '03), (2003)
[7]
Rivest R.L., Shamir A., Adleman L.M., A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21, 2, pp. 120-126, (1978)
[8]
Koblitz N., Elliptic curve cryptosystems, Mathematics of Computation 48, pp. 203-209, (1987)
[9]
Gura N., Patel A., Wander A., Eberle H., Shantz S.C., Comparing elliptic curve cryptography and RSA on 8-bit CPUs, Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, (2004)
[10]
Du W., Deng J., Han Y.S., Chen S., Varshney P.K., Proceedings of IEEE INFOCOM 2004